main.c 73 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326
  1. #include "define.h"
  2. #include "main.h"
  3. //==========================
  4. // System basic sample constant
  5. //==========================
  6. #define ARRAY_SIZE(A) (sizeof(A) / sizeof(A[0]))
  7. #define PASS 1
  8. #define FAIL -1
  9. #define YES 1
  10. #define NO 0
  11. #define ON 1
  12. #define OFF 0
  13. #define BUFFER_SIZE 128
  14. //==========================
  15. // Timer interval
  16. //==========================
  17. #define TMR_IDX_HANDSHAKING 0
  18. #define TMR_IDX_AUTH 1
  19. #define TMR_IDX_2 2
  20. #define TMR_IDX_3 3
  21. #define TMR_IDX_4 4
  22. #define TMR_IDX_5 5
  23. #define TMR_IDX_6 6
  24. #define TMR_IDX_7 7
  25. #define TMR_IDX_8 8
  26. #define TMR_IDX_9 9
  27. #define TIMEOUT_SPEC_HANDSHAKING 180000
  28. #define TIMEOUT_SPEC_AUTH 30000
  29. #define TIMEOUT_SPEC_HANDSHAKING_LED 185000
  30. #define MtdBlockSize 0x600000
  31. //==========================
  32. // Declare method
  33. //==========================
  34. void trim(char *s);
  35. int mystrcmp(char *p1,char *p2);
  36. void substr(char *dest, const char* src, unsigned int start, unsigned int cnt);
  37. void split(char **arr, char *str, const char *del);
  38. int isReachableInternet();
  39. int InitRfidPort(void);
  40. int GetAlarmValue(void);
  41. int GetInfoValue(void);
  42. int GetFaultValue(void);
  43. int GetCardSerialNumber();
  44. void setLedMotion(unsigned char gun_index,unsigned char led_mode);
  45. void setRelay(unsigned char gun_index,unsigned char isOn);
  46. void setSpeaker(unsigned char isOn, unsigned char speaker_mode);
  47. //==========================
  48. // Declare RFID module type
  49. //==========================
  50. #define MODULE_EWT 0
  51. int rfidFd = -1;
  52. char* rfidPortName = "/dev/ttyS2";
  53. RFID rfid;
  54. char *valid_Internet[2] = {"8.8.8.8", "180.76.76.76"};
  55. //==========================
  56. // Declare share memory
  57. //==========================
  58. struct SysConfigAndInfo *ShmSysConfigAndInfo;
  59. struct StatusCodeData *ShmStatusCodeData;
  60. struct PsuData *ShmPsuData;
  61. struct CHAdeMOData *ShmCHAdeMOData;
  62. struct CcsData *ShmCcsData;
  63. struct PrimaryMcuData *ShmPrimaryMcuData;
  64. struct FanModuleData *ShmFanModuleData;
  65. struct RelayModuleData *ShmRelayModuleData;
  66. struct OCPP16Data *ShmOCPP16Data;
  67. struct Charger *ShmCharger;
  68. struct timeb startTime[AC_QUANTITY][10];
  69. struct timeb startChargingTime[AC_QUANTITY];
  70. struct timeb endChargingTime[AC_QUANTITY];
  71. sqlite3 *localDb;
  72. //=================================
  73. // Common routine
  74. //=================================
  75. void trim(char *s)
  76. {
  77. int i=0, j, k, l=0;
  78. while((s[i]==' ')||(s[i]=='\t')||(s[i]=='\n'))
  79. i++;
  80. j = strlen(s)-1;
  81. while((s[j]==' ')||(s[j]=='\t')||(s[j]=='\n'))
  82. j--;
  83. if(i==0 && j==strlen(s)-1) { }
  84. else if(i==0) s[j+1] = '\0';
  85. else {
  86. for(k=i; k<=j; k++) s[l++] = s[k];
  87. s[l] = '\0';
  88. }
  89. }
  90. int mystrcmp(char *p1,char *p2)
  91. {
  92. while(*p1==*p2)
  93. {
  94. if(*p1=='\0' || *p2=='\0')
  95. break;
  96. p1++;
  97. p2++;
  98. }
  99. if(*p1=='\0' && *p2=='\0')
  100. return(PASS);
  101. else
  102. return(FAIL);
  103. }
  104. void substr(char *dest, const char* src, unsigned int start, unsigned int cnt)
  105. {
  106. strncpy(dest, src + start, cnt);
  107. dest[cnt] = 0;
  108. }
  109. void split(char **arr, char *str, const char *del)
  110. {
  111. char *s = strtok(str, del);
  112. while(s != NULL)
  113. {
  114. *arr++ = s;
  115. s = strtok(NULL, del);
  116. }
  117. }
  118. int StoreLogMsg(const char *fmt, ...)
  119. {
  120. char Buf[4096+256];
  121. char buffer[4096];
  122. time_t CurrentTime;
  123. struct tm *tm;
  124. va_list args;
  125. va_start(args, fmt);
  126. int rc = vsnprintf(buffer, sizeof(buffer), fmt, args);
  127. va_end(args);
  128. memset(Buf,0,sizeof(Buf));
  129. CurrentTime = time(NULL);
  130. tm=localtime(&CurrentTime);
  131. sprintf(Buf,"echo \"[%04d.%02d.%02d %02d:%02d:%02d] - %s\" >> /Storage/SystemLog/[%04d.%02d]SystemLog",
  132. tm->tm_year+1900,tm->tm_mon+1,tm->tm_mday,tm->tm_hour,tm->tm_min,tm->tm_sec,
  133. buffer,
  134. tm->tm_year+1900,tm->tm_mon+1);
  135. #ifdef SystemLogMessage
  136. system(Buf);
  137. #endif
  138. printf("[%04d.%02d.%02d %02d:%02d:%02d] - %s", tm->tm_year+1900,tm->tm_mon+1,tm->tm_mday,tm->tm_hour,tm->tm_min,tm->tm_sec, buffer);
  139. return rc;
  140. }
  141. int DiffTimebWithNow(struct timeb ST)
  142. {
  143. //return milli-second
  144. struct timeb ET;
  145. unsigned int StartTime,StopTime;
  146. ftime(&ET);
  147. StartTime=(unsigned int)ST.time;
  148. StopTime=(unsigned int)ET.time;
  149. return (StopTime-StartTime)*1000+ET.millitm-ST.millitm;
  150. }
  151. int DiffTimeb(struct timeb ST, struct timeb ET)
  152. {
  153. //return milli-second
  154. unsigned int StartTime,StopTime;
  155. StartTime=(unsigned int)ST.time;
  156. StopTime=(unsigned int)ET.time;
  157. return (StopTime-StartTime)*1000+ET.millitm-ST.millitm;
  158. }
  159. void getDateTimeString(char* result)
  160. {
  161. time_t CurrentTime;
  162. struct tm *tm;
  163. CurrentTime = time(NULL);
  164. tm=localtime(&CurrentTime);
  165. sprintf(result, "%04d.%02d.%02d %02d:%02d:%02d", tm->tm_year+1900,tm->tm_mon+1,tm->tm_mday,tm->tm_hour,tm->tm_min,tm->tm_sec);
  166. }
  167. //======================================================
  168. // Check interface status
  169. //======================================================
  170. int isInterfaceUp(const char *interface)
  171. {
  172. int result = FAIL;
  173. FILE *fp;
  174. char cmd[256];
  175. char buf[512];
  176. strcpy(cmd, "ifconfig");;
  177. fp = popen(cmd, "r");
  178. if(fp != NULL)
  179. {
  180. while(fgets(buf, sizeof(buf), fp) != NULL)
  181. {
  182. if(strstr(buf, interface) > 0)
  183. {
  184. result = PASS;
  185. }
  186. }
  187. }
  188. pclose(fp);
  189. return result;
  190. }
  191. //======================================================
  192. // Create all share memory
  193. //======================================================
  194. int CreatShareMemory()
  195. {
  196. int result = PASS;
  197. int MeterSMId;
  198. //creat ShmSysConfigAndInfo
  199. if ((MeterSMId = shmget(ShmSysConfigAndInfoKey, sizeof(struct SysConfigAndInfo), IPC_CREAT | 0777)) < 0)
  200. {
  201. DEBUG_ERROR("shmget ShmSysConfigAndInfo NG\r\n");
  202. result = FAIL;
  203. }
  204. else if ((ShmSysConfigAndInfo = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  205. {
  206. DEBUG_ERROR("shmat ShmSysConfigAndInfo NG\r\n");
  207. result = FAIL;
  208. }
  209. memset(ShmSysConfigAndInfo,0,sizeof(struct SysConfigAndInfo));
  210. //creat ShmStatusCodeData
  211. if ((MeterSMId = shmget(ShmStatusCodeKey, sizeof(struct StatusCodeData), IPC_CREAT | 0777)) < 0)
  212. {
  213. DEBUG_ERROR("shmget ShmStatusCodeData NG\r\n");
  214. result = FAIL;
  215. }
  216. else if ((ShmStatusCodeData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  217. {
  218. DEBUG_ERROR("shmat ShmStatusCodeData NG\r\n");
  219. result = FAIL;
  220. }
  221. memset(ShmStatusCodeData, 0, sizeof(struct StatusCodeData));
  222. //creat ShmPsuData
  223. if ((MeterSMId = shmget(ShmPsuKey, sizeof(struct PsuData), IPC_CREAT | 0777)) < 0)
  224. {
  225. DEBUG_ERROR("shmget ShmPsuData NG\r\n");
  226. result = FAIL;
  227. }
  228. else if ((ShmPsuData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  229. {
  230. DEBUG_ERROR("shmat ShmPsuData NG\r\n");
  231. result = FAIL;
  232. }
  233. memset(ShmPsuData,0,sizeof(struct PsuData));
  234. //creat ShmCHAdeMOData
  235. if ((MeterSMId = shmget(ShmCHAdeMOCommKey, sizeof(struct CHAdeMOData), IPC_CREAT | 0777)) < 0)
  236. {
  237. DEBUG_ERROR("shmget ShmCHAdeMOData NG1\r\n");
  238. result = FAIL;
  239. }
  240. else if ((ShmCHAdeMOData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  241. {
  242. DEBUG_ERROR("shmat ShmCHAdeMOData NG2\r\n");
  243. result = FAIL;
  244. }
  245. memset(ShmCHAdeMOData,0,sizeof(struct CHAdeMOData));
  246. //creat ShmCcsData
  247. if ((MeterSMId = shmget(ShmCcsCommKey, sizeof(struct CcsData), IPC_CREAT | 0777)) < 0)
  248. {
  249. DEBUG_ERROR("shmget ShmCcsData NG\r\n");
  250. result = FAIL;
  251. }
  252. else if ((ShmCcsData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  253. {
  254. DEBUG_ERROR("shmat ShmCcsData NG\r\n");
  255. result = FAIL;
  256. }
  257. memset(ShmCcsData,0,sizeof(struct CcsData));
  258. //creat ShmPrimaryMcuData
  259. if ((MeterSMId = shmget(ShmPrimaryMcuKey, sizeof(struct PrimaryMcuData), IPC_CREAT | 0777)) < 0)
  260. {
  261. DEBUG_ERROR("shmget ShmPrimaryMcuData NG\r\n");
  262. result = FAIL;
  263. }
  264. else if ((ShmPrimaryMcuData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  265. {
  266. DEBUG_ERROR("shmat ShmPrimaryMcuData NG\r\n");
  267. result = FAIL;
  268. }
  269. memset(ShmPrimaryMcuData,0,sizeof(struct PrimaryMcuData));
  270. /*
  271. //creat ShmFanModuleData
  272. if ((MeterSMId = shmget(ShmFanBdKey, sizeof(struct FanModuleData), IPC_CREAT | 0777)) < 0)
  273. {
  274. DEBUG_ERROR("shmget ShmFanModuleData NG\r\n");
  275. result = FAIL;
  276. }
  277. else if ((ShmFanModuleData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  278. {
  279. DEBUG_ERROR("shmat ShmFanModuleData NG\r\n");
  280. result = FAIL;
  281. }
  282. memset(ShmFanModuleData,0,sizeof(struct FanModuleData));
  283. //creat ShmRelayModuleData
  284. if ((MeterSMId = shmget(ShmRelayBdKey, sizeof(struct RelayModuleData), IPC_CREAT | 0777)) < 0)
  285. {
  286. DEBUG_ERROR("shmget ShmRelayModuleData NG\r\n");
  287. result = FAIL;
  288. }
  289. else if ((ShmRelayModuleData = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  290. {
  291. DEBUG_ERROR("shmat ShmRelayModuleData NG\r\n");
  292. result = FAIL;
  293. }
  294. memset(ShmRelayModuleData,0,sizeof(struct RelayModuleData));*/
  295. //creat ShmOCPP16Data
  296. if ((MeterSMId = shmget(ShmOcppModuleKey, sizeof(struct OCPP16Data), IPC_CREAT | 0777)) < 0)
  297. {
  298. DEBUG_ERROR("shmget ShmOCPP16Data NG\r\n");
  299. result = FAIL;
  300. }
  301. else if ((ShmOCPP16Data = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  302. {
  303. DEBUG_ERROR("shmat ShmOCPP16Data NG\r\n");
  304. result = FAIL;
  305. }
  306. memset(ShmOCPP16Data,0,sizeof(struct OCPP16Data));
  307. //creat ShmCharger
  308. if ((MeterSMId = shmget(ShmChargerKey, sizeof(struct Charger), IPC_CREAT | 0777)) < 0)
  309. {
  310. DEBUG_ERROR("shmget ShmCharger NG\r\n");
  311. result = FAIL;
  312. }
  313. else if ((ShmCharger = shmat(MeterSMId, NULL, 0)) == (void *) -1)
  314. {
  315. DEBUG_ERROR("shmat ShmCharger NG\r\n");
  316. result = FAIL;
  317. }
  318. memset(ShmCharger,0,sizeof(struct Charger));
  319. return result;
  320. }
  321. //===============================================
  322. // SQLite3 related routine
  323. //===============================================
  324. int DB_Open(sqlite3 *db)
  325. {
  326. int result = PASS;
  327. char* errMsg = NULL;
  328. char* createSql="CREATE TABLE IF NOT EXISTS charging_record("
  329. "idx integer primary key AUTOINCREMENT, "
  330. "reservationId text, "
  331. "transactionId text, "
  332. "startMethod text, "
  333. "userId text, "
  334. "dateTimeStart text, "
  335. "dateTimeStop text,"
  336. "socStart text, "
  337. "socStop text, "
  338. "chargeEnergy text, "
  339. "stopReason text"
  340. ");";
  341. //sqlite3_config(SQLITE_CONFIG_URI, 1);
  342. if(sqlite3_open("/Storage/ChargeLog/localCgargingRecord.db", &db))
  343. {
  344. result = FAIL;
  345. DEBUG_INFO( "Can't open database: %s\r\n", sqlite3_errmsg(db));
  346. sqlite3_close(db);
  347. }
  348. else
  349. {
  350. DEBUG_INFO( "Local charging record database open successfully.\r\n");
  351. if (sqlite3_exec(db, createSql, 0, 0, &errMsg) != SQLITE_OK)
  352. {
  353. result = FAIL;
  354. DEBUG_INFO( "Create local charging record table error message: %s\n", errMsg);
  355. }
  356. else
  357. {
  358. DEBUG_INFO( "Opened local charging record table successfully\n");
  359. }
  360. sqlite3_close(db);
  361. }
  362. return result;
  363. }
  364. int DB_Insert_Record(sqlite3 *db, int gun_index)
  365. {
  366. int result = PASS;
  367. char* errMsg = NULL;
  368. char insertSql[1024];
  369. sprintf(insertSql, "insert into charging_record(reservationId, transactionId, startMethod, userId, dateTimeStart, dateTimeStop, socStart, socStop, chargeEnergy, stopReason) "
  370. "values('%d', '%d', '%d', '%s', '%s', '%s', '%d', '%d', '%f', '%s');",
  371. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].ReservationId,
  372. ShmOCPP16Data->StartTransaction[gun_index].ResponseTransactionId,
  373. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod,
  374. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartUserId,
  375. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartDateTime,
  376. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StopDateTime,
  377. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].EvBatterySoc,
  378. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].EvBatterySoc,
  379. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedEnergy,
  380. ShmOCPP16Data->StopTransaction[gun_index].StopReason);
  381. if(sqlite3_open("/Storage/ChargeLog/localCgargingRecord.db", &db))
  382. {
  383. result = FAIL;
  384. DEBUG_INFO( "Can't open database: %s\r\n", sqlite3_errmsg(db));
  385. sqlite3_close(db);
  386. }
  387. else
  388. {
  389. DEBUG_INFO( "Local charging record database open successfully.\r\n");
  390. if (sqlite3_exec(db, insertSql, 0, 0, &errMsg) != SQLITE_OK)
  391. {
  392. result = FAIL;
  393. DEBUG_INFO( "Insert local charging record error message: %s\n", errMsg);
  394. }
  395. else
  396. {
  397. DEBUG_INFO( "Insert local charging record successfully\n");
  398. }
  399. sqlite3_close(db);
  400. }
  401. return result;
  402. }
  403. //======================================================
  404. // Peripheral initial
  405. //======================================================
  406. void InitGPIO()
  407. {
  408. /*****************0~3, 4 bank, bank x 32+ num*********************/
  409. /***************************************************************/
  410. /*************** INPUT PIN ***************************************/
  411. /***************************************************************/
  412. /***************************************************************/
  413. /*************** OUTPUT PIN ************************************/
  414. /***************************************************************/
  415. /*MCU request:GPIO3_20 => H:ON; L:OFF*/
  416. system("echo 116 > /sys/class/gpio/export");
  417. system("echo \"out\" > /sys/class/gpio/gpio116/direction");
  418. system("echo 0 > /sys/class/gpio/gpio116/value");
  419. /*Rfid:GPIO0_19 => Reset_PING H:ON; L:OFF*/
  420. system("echo 19 > /sys/class/gpio/export");
  421. system("echo \"out\" > /sys/class/gpio/gpio19/direction");
  422. system("echo 1 > /sys/class/gpio/gpio19/value");
  423. /*Speaker:GPIO2_1 => H:ON; L:OFF*/
  424. system("echo 65 > /sys/class/gpio/export");
  425. system("echo \"out\" > /sys/class/gpio/gpio65/direction");
  426. system("echo 0 > /sys/class/gpio/gpio65/value");
  427. DEBUG_INFO("Initial GPIO OK\r\n");
  428. }
  429. int LoadSysConfigAndInfo(struct SysConfigData *ptr)
  430. {
  431. int fd,wrd;
  432. unsigned char *buf;
  433. unsigned int ChkSum,ChkSumOrg;
  434. if((buf=malloc(MtdBlockSize))==NULL)
  435. {
  436. DEBUG_ERROR("malloc buffer NG,rebooting..\r\n");
  437. if(ShmStatusCodeData!=NULL)
  438. {
  439. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed=1;
  440. }
  441. sleep(5);
  442. system("reboot -f");
  443. sleep(5);
  444. system("reboot -f");
  445. }
  446. memset(buf, 0, MtdBlockSize);
  447. //================================================
  448. // Load configuration from mtdblock10
  449. //================================================
  450. fd = open("/dev/mtdblock10", O_RDWR);
  451. if (fd < 0)
  452. {
  453. free(buf);
  454. DEBUG_ERROR("open mtdblock10 NG,rebooting..\r\n");
  455. if(ShmStatusCodeData!=NULL)
  456. {
  457. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed=1;
  458. }
  459. sleep(5);
  460. system("reboot -f");
  461. sleep(5);
  462. system("reboot -f");
  463. }
  464. wrd=read(fd, buf, MtdBlockSize);
  465. close(fd);
  466. if(wrd<MtdBlockSize)
  467. {
  468. free(buf);
  469. DEBUG_ERROR("read SysConfigData data NG,rebooting..\r\n");
  470. if(ShmStatusCodeData!=NULL)
  471. {
  472. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed=1;
  473. }
  474. sleep(5);
  475. system("reboot -f");
  476. sleep(5);
  477. system("reboot -f");
  478. }
  479. ChkSum=0;
  480. for(wrd=0;wrd<MtdBlockSize-4;wrd++)
  481. {
  482. ChkSum+=buf[wrd];
  483. }
  484. memcpy(&ChkSumOrg,buf+(MtdBlockSize-4),sizeof(ChkSumOrg));
  485. //================================================
  486. // Load configuration from mtdblock11
  487. //================================================
  488. if(ChkSum!=ChkSumOrg)
  489. {
  490. DEBUG_ERROR("Primary SysConfigData checksum NG, read backup\r\n");
  491. fd = open("/dev/mtdblock11", O_RDWR);
  492. if (fd < 0)
  493. {
  494. free(buf);
  495. DEBUG_ERROR("open mtdblock11 (backup) NG,rebooting..\r\n");
  496. if(ShmStatusCodeData!=NULL)
  497. {
  498. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed=1;
  499. }
  500. sleep(5);
  501. system("reboot -f");
  502. sleep(5);
  503. system("reboot -f");
  504. }
  505. memset(buf, 0, MtdBlockSize);
  506. wrd=read(fd, buf,MtdBlockSize);
  507. close(fd);
  508. if(wrd<MtdBlockSize)
  509. {
  510. free(buf);
  511. DEBUG_ERROR("read backup SysConfigData data NG,rebooting..\r\n");
  512. if(ShmStatusCodeData!=NULL)
  513. {
  514. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed=1;
  515. }
  516. sleep(5);
  517. system("reboot -f");
  518. sleep(5);
  519. system("reboot -f");
  520. }
  521. ChkSum=0;
  522. for(wrd=0;wrd<MtdBlockSize-4;wrd++)
  523. {
  524. ChkSum+=buf[wrd];
  525. }
  526. memcpy(&ChkSumOrg,buf+(MtdBlockSize-4),sizeof(ChkSumOrg));
  527. //================================================
  528. // Load configuration from mtdblock12 (Factory default)
  529. //================================================
  530. if(ChkSum!=ChkSumOrg)
  531. {
  532. DEBUG_WARN("backup SysConfigData checksum NG, read Factory default\r\n");
  533. fd = open("/dev/mtdblock12", O_RDWR);
  534. if (fd < 0)
  535. {
  536. free(buf);
  537. DEBUG_ERROR("open mtdblock12 (Factory default) NG,rebooting..\r\n");
  538. if(ShmStatusCodeData!=NULL)
  539. {
  540. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed=1;
  541. }
  542. sleep(5);
  543. system("reboot -f");
  544. sleep(5);
  545. system("reboot -f");
  546. }
  547. memset(buf, 0, MtdBlockSize);
  548. wrd=read(fd, buf,MtdBlockSize);
  549. close(fd);
  550. if(wrd<MtdBlockSize)
  551. {
  552. free(buf);
  553. DEBUG_ERROR("read factory default SysConfigData data NG,rebooting..\r\n");
  554. if(ShmStatusCodeData!=NULL)
  555. {
  556. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed=1;
  557. }
  558. sleep(5);
  559. system("reboot -f");
  560. sleep(5);
  561. system("reboot -f");
  562. }
  563. ChkSum=0;
  564. for(wrd=0;wrd<MtdBlockSize-4;wrd++)
  565. {
  566. ChkSum+=buf[wrd];
  567. }
  568. memcpy(&ChkSumOrg,buf+(MtdBlockSize-4),sizeof(ChkSumOrg));
  569. if(ChkSum!=ChkSumOrg)
  570. {
  571. DEBUG_WARN("factory default SysConfigData checksum NG, restore factory default\r\n");
  572. free(buf);
  573. system("cd /root;./Module_FactoryConfig -m");
  574. system("sync");
  575. sleep(5);
  576. system("reboot -f");
  577. sleep(5);
  578. system("reboot -f");
  579. return FAIL;
  580. }
  581. }
  582. }
  583. //load OK
  584. memcpy((struct SysConfigData *)ptr,buf,sizeof(struct SysConfigData));
  585. free(buf);
  586. DEBUG_INFO("Load SysConfigData OK\r\n");
  587. return PASS;
  588. }
  589. void InitEthernet()
  590. {
  591. pid_t pid;
  592. uint8_t cnt_pingDNS_Fail;
  593. char tmpbuf[256];
  594. //unsigned int address;
  595. //Init Eth0 for internet
  596. if(isInterfaceUp("eth0")==PASS)
  597. {
  598. memset(tmpbuf,0,256);
  599. sprintf(tmpbuf,"/sbin/ifconfig eth0 %s netmask %s up",
  600. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthIpAddress,
  601. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthSubmaskAddress);
  602. system(tmpbuf);
  603. memset(tmpbuf,0,256);
  604. sprintf(tmpbuf,"route add default gw %s eth0 ",
  605. ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthGatewayAddress);
  606. system(tmpbuf);
  607. }
  608. if(isInterfaceUp("eth1")==PASS)
  609. {
  610. //Init Eth1 for administrator tool
  611. memset(tmpbuf,0,256);
  612. sprintf(tmpbuf,"/sbin/ifconfig eth1 %s netmask %s up",
  613. ShmSysConfigAndInfo->SysConfig.Eth1Interface.EthIpAddress,
  614. ShmSysConfigAndInfo->SysConfig.Eth1Interface.EthSubmaskAddress);
  615. system(tmpbuf);
  616. }
  617. //Run DHCP client if enabled
  618. system("killall udhcpc");
  619. system("rm -rf /etc/resolv.conf");
  620. system("echo nameserver 8.8.8.8 > /etc/resolv.conf"); //Google DNS server
  621. system("echo nameserver 180.76.76.76 > /etc/resolv.conf"); //Baidu DNS server
  622. if(ShmSysConfigAndInfo->SysConfig.Eth0Interface.EthDhcpClient==0)
  623. system("/sbin/udhcpc -i eth0 -s /root/dhcp_script/eth0.script > /dev/null &");
  624. //check internet status
  625. pid = fork();
  626. if(pid == 0)
  627. {
  628. for(;;)
  629. {
  630. if(isReachableInternet() == PASS)
  631. {
  632. ShmSysConfigAndInfo->SysInfo.InternetConn = ON;
  633. ShmStatusCodeData->InfoCode.InfoEvents.bits.InternetDisconnectViaEthernet=OFF;
  634. cnt_pingDNS_Fail = 0;
  635. }
  636. else
  637. {
  638. if(++cnt_pingDNS_Fail > 3)
  639. {
  640. ShmSysConfigAndInfo->SysInfo.InternetConn = OFF;
  641. ShmStatusCodeData->InfoCode.InfoEvents.bits.InternetDisconnectViaEthernet=ON;
  642. }
  643. }
  644. sleep(5);
  645. }
  646. }
  647. DEBUG_INFO("Initial Ethernet OK\r\n");
  648. }
  649. int SpawnTask()
  650. {
  651. system ("pkill Module_4g");
  652. system ("pkill Module_Wifi");
  653. system ("pkill Module_EventLogging");
  654. system ("pkill OcppBackend");
  655. system ("pkill Module_AlarmDetect");
  656. system ("pkill Module_InternalComm");
  657. system ("pkill Module_Speaker");
  658. if(ShmSysConfigAndInfo->SysConfig.ModelName[10] == 'T')
  659. {
  660. system("/root/Module_4g &");
  661. }
  662. else if(ShmSysConfigAndInfo->SysConfig.ModelName[10] == 'W')
  663. {
  664. system("/root/Module_Wifi &");
  665. }
  666. system("/root/Module_EventLogging &");
  667. if(strcmp((char *)&ShmSysConfigAndInfo->SysConfig.OcppServerURL,"") != 0)
  668. {
  669. system("/root/OcppBackend &");
  670. }
  671. system("/root/Module_AlarmDetect &");
  672. system("/root/Module_InternalComm &");
  673. system ("/root/Module_Speaker &");
  674. return PASS;
  675. }
  676. int StoreUsrConfigData(struct SysConfigData *UsrData)
  677. {
  678. int result = PASS;
  679. int fd,wrd;
  680. unsigned int i,Chk;
  681. unsigned char *ptr, *BufTmp;
  682. Chk=0;
  683. ptr=(unsigned char *)UsrData;
  684. if((BufTmp=malloc(MtdBlockSize))!=NULL)
  685. {
  686. memset(BufTmp,0,MtdBlockSize);
  687. memcpy(BufTmp,ptr,sizeof(struct SysConfigData));
  688. for(i=0;i<MtdBlockSize-4;i++)
  689. Chk+=*(BufTmp+i);
  690. memcpy( BufTmp+MtdBlockSize-4,&Chk,4);
  691. fd = open("/dev/mtdblock10", O_RDWR);
  692. if (fd>0)
  693. {
  694. wrd=write(fd, BufTmp, MtdBlockSize);
  695. close(fd);
  696. if(wrd>=MtdBlockSize)
  697. {
  698. fd = open("/dev/mtdblock11", O_RDWR);
  699. if (fd>0)
  700. {
  701. wrd=write(fd, BufTmp, MtdBlockSize);
  702. close(fd);
  703. if(wrd<MtdBlockSize)
  704. {
  705. DEBUG_ERROR("write /dev/mtdblock11(backup) NG\r\n");
  706. result = FAIL;
  707. }
  708. }
  709. else
  710. {
  711. DEBUG_ERROR("open /dev/mtdblock11(backup) NG\r\n");
  712. result = FAIL;
  713. }
  714. }
  715. else
  716. {
  717. DEBUG_ERROR("write /dev/mtdblock10 NG\r\n");
  718. result = FAIL;
  719. }
  720. }
  721. else
  722. {
  723. DEBUG_ERROR("open /dev/mtdblock10 NG\r\n");
  724. result = FAIL;
  725. }
  726. }
  727. else
  728. {
  729. DEBUG_ERROR("alloc BlockSize NG\r\n");
  730. result = FAIL;
  731. }
  732. if(BufTmp!=NULL)
  733. free(BufTmp);
  734. return result;
  735. }
  736. int Initialization()
  737. {
  738. int result = PASS;
  739. LoadSysConfigAndInfo(&ShmSysConfigAndInfo->SysConfig);
  740. InitGPIO();
  741. InitEthernet();
  742. rfidFd = InitRfidPort();
  743. if((DB_Open(localDb) != PASS) || (rfidFd < 0))
  744. result = FAIL;
  745. if(result == PASS)
  746. DEBUG_INFO("Initialization OK.\r\n");
  747. else
  748. DEBUG_INFO("Initialization Fail.\r\n");
  749. return result;
  750. }
  751. //=====================================================
  752. // Common routine
  753. //=====================================================
  754. char* getSystemModeName(unsigned char mode)
  755. {
  756. char* result;
  757. switch(mode)
  758. {
  759. case SYS_MODE_BOOTING:
  760. result = "booting";
  761. break;
  762. case SYS_MODE_IDLE:
  763. result = "idle";
  764. break;
  765. case SYS_MODE_AUTHORIZING:
  766. result = "authorizing";
  767. break;
  768. case SYS_MODE_PREPARING:
  769. result = "preparing";
  770. break;
  771. case SYS_MODE_CHARGING:
  772. result = "charging";
  773. break;
  774. case SYS_MODE_TERMINATING:
  775. result = "terminating";
  776. break;
  777. case SYS_MODE_ALARM:
  778. result = "alarm";
  779. break;
  780. case SYS_MODE_FAULT:
  781. result = "fault";
  782. break;
  783. case SYS_MODE_MAINTAIN:
  784. result = "maintain";
  785. break;
  786. case SYS_MODE_RESERVATION:
  787. result = "reservation";
  788. break;
  789. case SYS_MODE_BOOKING:
  790. result = "booking";
  791. break;
  792. case SYS_MODE_DEBUG:
  793. result = "debug";
  794. break;
  795. }
  796. return result;
  797. }
  798. void setChargerMode(unsigned char gun_index, unsigned char mode)
  799. {
  800. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus = ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus;
  801. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus = mode;
  802. DEBUG_INFO("Gun-%02d mode switch from %s to %s\r\n", gun_index, getSystemModeName(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus), getSystemModeName(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus));
  803. }
  804. unsigned char isMode(unsigned char gun_index, unsigned char mode)
  805. {
  806. return ((ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus == mode)?YES:NO);
  807. }
  808. unsigned char isModeChange(unsigned char gun_index)
  809. {
  810. unsigned char result = NO;
  811. if(!isMode(gun_index, ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus))
  812. {
  813. result = YES;
  814. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus = ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus;
  815. }
  816. return result;
  817. }
  818. //===============================================
  819. // Get firmware version
  820. //===============================================
  821. void get_firmware_version(unsigned char gun_index)
  822. {
  823. FILE *fp;
  824. char cmd[512];
  825. char buf[512];
  826. // Get CSU hardware version
  827. sprintf((char*)ShmSysConfigAndInfo->SysInfo.CsuHwRev, "REV.XXXXXXX");
  828. // Get CSU boot loader version
  829. memcpy(ShmSysConfigAndInfo->SysInfo.CsuBootLoadFwRev, ShmSysConfigAndInfo->SysConfig.CsuBootLoadFwRev, ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.CsuBootLoadFwRev));
  830. // Get CSU kernel version
  831. sprintf(cmd, "/bin/uname -r");
  832. fp = popen(cmd, "r");
  833. if(fp == NULL)
  834. sprintf((char*)ShmSysConfigAndInfo->SysInfo.CsuKernelFwRev, "Unknown version");
  835. else
  836. {
  837. while(fgets(buf, sizeof(buf), fp) != NULL)
  838. {
  839. strcpy((char*)ShmSysConfigAndInfo->SysInfo.CsuKernelFwRev, buf);
  840. }
  841. }
  842. // Get CSU root file system version
  843. sprintf((char*)ShmSysConfigAndInfo->SysInfo.CsuRootFsFwRev, "D0.04.60.6007.BT");
  844. // Get MCU firmware version
  845. strcpy((char*)ShmSysConfigAndInfo->SysInfo.CsuPrimFwRev, ShmCharger->gun_info[gun_index].ver.Version_FW);
  846. DEBUG_INFO("CSU hardware version: %s\r\n", ShmSysConfigAndInfo->SysInfo.CsuHwRev);
  847. DEBUG_INFO("CSU boot loader version: %s\r\n", ShmSysConfigAndInfo->SysInfo.CsuBootLoadFwRev);
  848. DEBUG_INFO("CSU kernel version: %s\r\n", ShmSysConfigAndInfo->SysInfo.CsuKernelFwRev);
  849. DEBUG_INFO("CSU root file system version: %s\r\n", ShmSysConfigAndInfo->SysInfo.CsuRootFsFwRev);
  850. DEBUG_INFO("CSU MCU-%2d firmware version: %s\r\n", gun_index, ShmCharger->gun_info[gun_index].ver.Version_FW);
  851. }
  852. //===============================================
  853. // Upgrade firmware
  854. //===============================================
  855. int upgrade_check()
  856. {
  857. int result = PASS;
  858. int fd;
  859. DIR *dir;
  860. struct dirent *file;
  861. char cmd[512];
  862. long int MaxLen=48*1024*1024;
  863. if ((dir = opendir ("/mnt")) != NULL)
  864. {
  865. /* print all the files and directories within directory */
  866. while ((file = readdir (dir)) != NULL)
  867. {
  868. if(strlen(file->d_name)>2)
  869. {
  870. memset(&ShmCharger->fwUpgradeInfo, 0xFF, sizeof(Fw_Upgrade_Info));
  871. DEBUG_INFO("New firmware file: %s\n", file->d_name);
  872. sprintf(ShmCharger->fwUpgradeInfo.location, "/mnt/%s", file->d_name);
  873. if((fd=open(ShmCharger->fwUpgradeInfo.location, O_RDONLY)) >= 0)
  874. {
  875. unsigned char *ptr = malloc(MaxLen); //-48 is take out the header
  876. memset(ptr, 0xFF, MaxLen); //-48 is take out the header
  877. read(fd, ptr, MaxLen);
  878. close(fd);
  879. ShmCharger->fwUpgradeInfo.fwType = ((ptr[0x13]<<0) | (ptr[0x12]<<8) | (ptr[0x11]<<16) | (ptr[0x10]<<24));
  880. substr(ShmCharger->fwUpgradeInfo.modelName, (char *)ptr, 0, 0x10);
  881. DEBUG_INFO("New firmware type: %X\r\n", ShmCharger->fwUpgradeInfo.fwType);
  882. DEBUG_INFO("New firmware model name: %s, %s\r\n", ShmCharger->fwUpgradeInfo.modelName, ShmSysConfigAndInfo->SysConfig.ModelName);
  883. if((strcmp(ShmCharger->fwUpgradeInfo.modelName, (char*)ShmSysConfigAndInfo->SysConfig.ModelName)==0) && (ShmCharger->fwUpgradeInfo.fwType>0))
  884. {
  885. switch(ShmCharger->fwUpgradeInfo.fwType)
  886. {
  887. case CSU_BOOTLOADER:
  888. case CSU_KERNEL_CONFIGURATION:
  889. case CSU_KERNEL_IMAGE:
  890. case CSU_ROOT_FILE_SYSTEM:
  891. case CSU_USER_CONFIGURATION:
  892. case CSU_PRIMARY_CONTROLLER:
  893. if(Upgrade_Flash(ShmCharger->fwUpgradeInfo.fwType, ShmCharger->fwUpgradeInfo.location, ShmCharger->fwUpgradeInfo.modelName) != PASS)
  894. result = FAIL;
  895. sprintf(cmd, "yes|rm %s", ShmCharger->fwUpgradeInfo.location);
  896. system(cmd);
  897. break;
  898. case AC_WALLMOUNT_CONTROLLER:
  899. for(int gun_index = 0;gun_index<AC_QUANTITY;gun_index++)
  900. ShmCharger->gun_info[gun_index].mcuFlag.isMcuUpgradeReq = ON;
  901. break;
  902. default:
  903. result = FAIL;
  904. DEBUG_WARN("Image file is unknown type.\r\n");
  905. sprintf(cmd, "yes|rm %s", ShmCharger->fwUpgradeInfo.location);
  906. system(cmd);
  907. break;
  908. }
  909. }
  910. free(ptr);
  911. }
  912. else
  913. {
  914. // File open error
  915. DEBUG_ERROR("New firmware open error.\r\n");
  916. }
  917. }
  918. }
  919. closedir (dir);
  920. }
  921. else
  922. {
  923. DEBUG_ERROR("/mnt does not valid.\r\n");
  924. }
  925. return result;
  926. }
  927. //===============================================
  928. // Check RFID is match with start user
  929. //===============================================
  930. int isMatchStartUser(unsigned char gun_index)
  931. {
  932. uint8_t tmpUser[32];
  933. if(ShmSysConfigAndInfo->SysConfig.RfidCardNumEndian)
  934. {
  935. // Big endian
  936. switch(rfid.snType)
  937. {
  938. case RFID_SN_TYPE_6BYTE:
  939. sprintf((char*)tmpUser, "%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5]);
  940. break;
  941. case RFID_SN_TYPE_7BYTE:
  942. sprintf((char*)tmpUser, "%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5], rfid.currentCard[6]);
  943. break;
  944. case RFID_SN_TYPE_10BYTE:
  945. sprintf((char*)tmpUser, "%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5], rfid.currentCard[6], rfid.currentCard[7], rfid.currentCard[8], rfid.currentCard[9]);
  946. break;
  947. case RFID_SN_TYPE_4BYTE:
  948. default:
  949. sprintf((char*)tmpUser, "%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3]);
  950. break;
  951. }
  952. }
  953. else
  954. {
  955. // Little endian
  956. switch(rfid.snType)
  957. {
  958. case RFID_SN_TYPE_6BYTE:
  959. sprintf((char*)tmpUser, "%02X%02X%02X%02X%02X%02X", rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  960. break;
  961. case RFID_SN_TYPE_7BYTE:
  962. sprintf((char*)tmpUser, "%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[6], rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  963. break;
  964. case RFID_SN_TYPE_10BYTE:
  965. sprintf((char*)tmpUser, "%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[9], rfid.currentCard[8], rfid.currentCard[7], rfid.currentCard[6], rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  966. break;
  967. case RFID_SN_TYPE_4BYTE:
  968. default:
  969. sprintf((char*)tmpUser, "%02X%02X%02X%02X", rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  970. break;
  971. }
  972. }
  973. return ((strcmp((char*)tmpUser, (char*)ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartUserId)==0)?YES:NO);
  974. }
  975. //===============================================
  976. // Read RFID Serial Number
  977. //===============================================
  978. int GetCardSerialNumber()
  979. {
  980. int isSuccess = FAIL;
  981. int module_type = MODULE_EWT;
  982. if(getRequestCardSN(rfidFd,module_type,&rfid))
  983. {
  984. if(rfid.cardType == ISO14443A)
  985. {
  986. if(rfid.snType == RFID_SN_TYPE_4BYTE)
  987. {
  988. isSuccess = PASS;
  989. }
  990. else if (rfid.snType == RFID_SN_TYPE_7BYTE)
  991. {
  992. isSuccess = PASS;
  993. }
  994. }
  995. else if(rfid.cardType == IS014443B)
  996. {
  997. isSuccess = PASS;
  998. }
  999. else if(rfid.cardType == FELICA)
  1000. {
  1001. isSuccess = PASS;
  1002. }
  1003. else
  1004. {}
  1005. }
  1006. else
  1007. {}
  1008. return isSuccess;
  1009. }
  1010. //===============================================
  1011. // Alarm value check
  1012. //===============================================
  1013. int GetAlarmValue()
  1014. {
  1015. int result = PASS;
  1016. if( (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[0] > 0) || (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[1] > 0) || (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[2] > 0) ||
  1017. (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[3] > 0) || (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[4] > 0) || (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[5] > 0) ||
  1018. (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[6] > 0) || (ShmStatusCodeData->AlarmCode.AlarmEvents.AlarmVal[7] > 0))
  1019. {
  1020. result = FAIL;
  1021. }
  1022. return result;
  1023. }
  1024. //===============================================
  1025. // Info value check
  1026. //===============================================
  1027. int GetInfoValue()
  1028. {
  1029. int result = PASS;
  1030. if( (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[0] > 0) || (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[1] > 0) || (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[2] > 0) ||
  1031. (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[3] > 0) || (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[4] > 0) || (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[5] > 0) ||
  1032. (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[6] > 0) || (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[7] > 0) || (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[8] > 0) ||
  1033. (ShmStatusCodeData->InfoCode.InfoEvents.InfoVal[9] > 0))
  1034. {
  1035. result = FAIL;
  1036. }
  1037. return result;
  1038. }
  1039. //===============================================
  1040. // Fault value check
  1041. //===============================================
  1042. int GetFaultValue()
  1043. {
  1044. int result = PASS;
  1045. if( (ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[0] > 0) ||
  1046. (ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[1] > 0) ||
  1047. (ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[2] > 0) ||
  1048. (ShmStatusCodeData->FaultCode.FaultEvents.FaultVal[3] > 0))
  1049. {
  1050. result = FAIL;
  1051. }
  1052. return result;
  1053. }
  1054. //===============================================
  1055. // Authorizing Response Status
  1056. //===============================================
  1057. int isAuthorizedPass()
  1058. {
  1059. int result = FAIL;
  1060. char tmp[16] = "";
  1061. memset(tmp, 0, ARRAY_SIZE(tmp));
  1062. for(int index = 0; index < strlen((char *)ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status);index++)
  1063. {
  1064. sprintf(tmp + (index - 1) * 2, "%02X",ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status[index]);
  1065. }
  1066. sprintf(tmp, "%s", ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status);
  1067. DEBUG_INFO("Authorize Response Id TagInfo: %s\r\n", ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status);
  1068. if(strstr(tmp, "Accepted") != 0)
  1069. {
  1070. result = PASS;
  1071. }
  1072. else
  1073. {}
  1074. return result;
  1075. }
  1076. //===============================================
  1077. // BootNotification Response Status
  1078. //===============================================
  1079. int isBootNotificationSignature()
  1080. {
  1081. int result = FAIL;
  1082. char tmp[16] = "";
  1083. memset(tmp, 0, ARRAY_SIZE(tmp));
  1084. for(int index = 0; index < strlen((char *)ShmOCPP16Data->BootNotification.ResponseStatus);index++)
  1085. {
  1086. sprintf(tmp + (index - 1) * 2, "%02X",ShmOCPP16Data->BootNotification.ResponseStatus[index]);
  1087. }
  1088. sprintf(tmp, "%s",ShmOCPP16Data->BootNotification.ResponseStatus);
  1089. DEBUG_INFO("BootNotification Response Status: %s\r\n", ShmOCPP16Data->BootNotification.ResponseStatus);
  1090. if(strstr(tmp, "Accepted") != 0)
  1091. {
  1092. result = PASS;
  1093. }
  1094. else
  1095. {}
  1096. return result;
  1097. }
  1098. //===============================================
  1099. // Set led motion
  1100. //===============================================
  1101. void setLedMotion(unsigned char gun_index,unsigned char led_mode)
  1102. {
  1103. switch(led_mode)
  1104. {
  1105. case LED_ACTION_INIT:
  1106. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_INIT;
  1107. break;
  1108. case LED_ACTION_IDLE:
  1109. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_IDLE;
  1110. break;
  1111. case LED_ACTION_AUTHED:
  1112. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_AUTHED;
  1113. break;
  1114. case LED_ACTION_CONNECTED:
  1115. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_CONNECTED;
  1116. break;
  1117. case LED_ACTION_CHARGING:
  1118. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_CHARGING;
  1119. break;
  1120. case LED_ACTION_STOP:
  1121. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_STOP;
  1122. break;
  1123. case LED_ACTION_ALARM:
  1124. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_ALARM;
  1125. break;
  1126. case LED_ACTION_MAINTAIN:
  1127. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_MAINTAIN;
  1128. break;
  1129. case LED_ACTION_RFID_PASS:
  1130. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_RFID_PASS;
  1131. break;
  1132. case LED_ACTION_RFID_FAIL:
  1133. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_RFID_FAIL;
  1134. break;
  1135. case LED_ACTION_BLE_CONNECT:
  1136. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_BLE_CONNECT;
  1137. break;
  1138. case LED_ACTION_BLE_DISABLE:
  1139. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_BLE_DISABLE;
  1140. break;
  1141. case LED_ACTION_DEBUG:
  1142. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_DEBUG;
  1143. break;
  1144. case LED_ACTION_ALL_OFF:
  1145. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_ALL_OFF;
  1146. break;
  1147. case LED_RELAY_ON:
  1148. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_RELAY_ON;
  1149. break;
  1150. case LED_RELAY_OFF:
  1151. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_RELAY_OFF;
  1152. break;
  1153. case LED_ACTION_HANDSHAKE_FAIL:
  1154. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_HANDSHAKE_FAIL;
  1155. break;
  1156. case LED_ACTION_INTERNET_DISCONNECT:
  1157. ShmCharger->gun_info[gun_index].primaryMcuLed.mode = LED_ACTION_INTERNET_DISCONNECT;
  1158. break;
  1159. }
  1160. }
  1161. //===============================================
  1162. // Relay on/off request
  1163. //===============================================
  1164. void setRelay(unsigned char gun_index,unsigned char isOn)
  1165. {
  1166. if(isOn == ON)
  1167. {
  1168. if(ShmCharger->gun_info[gun_index].legacyRequest.isLegacyRequest == OFF)
  1169. {
  1170. ShmCharger->gun_info[gun_index].legacyRequest.isLegacyRequest = ON;
  1171. DEBUG_INFO("Gun-%d Output relay sts: ON \r\n",gun_index);
  1172. }
  1173. }
  1174. else
  1175. {
  1176. if(ShmCharger->gun_info[gun_index].legacyRequest.isLegacyRequest == ON)
  1177. {
  1178. ShmCharger->gun_info[gun_index].legacyRequest.isLegacyRequest = OFF;
  1179. DEBUG_INFO("Gun-%d Output relay sts: OFF \r\n",gun_index);
  1180. }
  1181. }
  1182. }
  1183. //===============================================
  1184. // Set speaker on/off request
  1185. //===============================================
  1186. void setSpeaker(unsigned char isOn, unsigned char speaker_mode)
  1187. {
  1188. if(isOn == ON)
  1189. {
  1190. ShmCharger->isSpeakerOn = ON;
  1191. ShmCharger->speaker_type = speaker_mode;
  1192. }
  1193. }
  1194. //===============================================
  1195. // Initialization RFID communication port
  1196. //===============================================
  1197. int InitRfidPort()
  1198. {
  1199. int uartO2 = open(rfidPortName, O_RDWR);
  1200. struct termios tios;
  1201. if (uartO2 != FAIL)
  1202. {
  1203. ioctl (uartO2, TCGETS, &tios);
  1204. tios.c_cflag = B19200 | CS8 | CLOCAL | CREAD;
  1205. tios.c_lflag = 0;
  1206. tios.c_iflag = 0;
  1207. tios.c_oflag = 0;
  1208. tios.c_cc[VMIN] = 0;
  1209. tios.c_cc[VTIME] = (unsigned char) 1;
  1210. tios.c_lflag = 0;
  1211. tcflush(uartO2, TCIFLUSH);
  1212. ioctl(uartO2, TCSETS, &tios);
  1213. }
  1214. if (uartO2 < 0)
  1215. {
  1216. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.RfidModuleCommFail = 1;
  1217. }
  1218. return uartO2;
  1219. }
  1220. //===============================================
  1221. // Check internet access status
  1222. //===============================================
  1223. int isReachableInternet()
  1224. {
  1225. int result = FAIL;
  1226. FILE *fp;
  1227. char cmd[256];
  1228. char buf[512];
  1229. //char tmp[512];
  1230. for(int idx=0;idx<ARRAY_SIZE(valid_Internet);idx++)
  1231. {
  1232. strcpy(cmd, "ping -c 1 -w 3 ");
  1233. strcat(cmd, valid_Internet[idx]);
  1234. fp = popen(cmd, "r");
  1235. if(fp != NULL)
  1236. {
  1237. while(fgets(buf, sizeof(buf), fp) != NULL)
  1238. {
  1239. if(strstr(buf, "transmitted") > 0)
  1240. {
  1241. //sscanf(buf, "%*s%*s%*s%*s%*s%*s%s", tmp);
  1242. if(strstr(buf,"100%") != NULL)
  1243. {
  1244. }
  1245. else
  1246. {
  1247. result = PASS;
  1248. }
  1249. //DEBUG_INFO("%s",buf);
  1250. //DEBUG_INFO("%s\n",tmp);
  1251. }
  1252. }
  1253. }
  1254. pclose(fp);
  1255. }
  1256. return result;
  1257. }
  1258. //===============================================
  1259. // Check reservation date is expired
  1260. //===============================================
  1261. int isReservationExpired(unsigned char gun_index)
  1262. {
  1263. int result = NO;
  1264. struct tm expiredDate;
  1265. struct timeb expiredTime;
  1266. if(sscanf((char*)ShmOCPP16Data->ReserveNow[gun_index].ExpiryDate, "%4d-%2d-%2dT%2d:%2d:%2d", &expiredDate.tm_year, &expiredDate.tm_mon, &expiredDate.tm_mday, &expiredDate.tm_hour, &expiredDate.tm_min, &expiredDate.tm_sec) == 6)
  1267. {
  1268. expiredTime.time = mktime(&expiredDate);
  1269. if(DiffTimebWithNow(expiredTime)>0)
  1270. {
  1271. result = YES;
  1272. }
  1273. }
  1274. else
  1275. DEBUG_WARN("Expired date parsing error\r\n");
  1276. return result;
  1277. }
  1278. //===============================================
  1279. // Valid from local white list
  1280. //===============================================
  1281. int isValidLocalWhiteCard()
  1282. {
  1283. uint8_t result = FAIL;
  1284. for(uint8_t idx=0;idx<ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.LocalWhiteCard);idx++)
  1285. {
  1286. if(strcmp((char*)ShmSysConfigAndInfo->SysConfig.UserId, (char*)ShmSysConfigAndInfo->SysConfig.LocalWhiteCard[idx]) == 0)
  1287. {
  1288. result = PASS;
  1289. }
  1290. }
  1291. return result;
  1292. }
  1293. //===============================================
  1294. // Main process
  1295. //===============================================
  1296. int main(void)
  1297. {
  1298. //Create all share memory
  1299. if(CreatShareMemory()==0)
  1300. {
  1301. DEBUG_ERROR("CreatShareMemory NG\r\n");
  1302. if(ShmStatusCodeData!=NULL)
  1303. {
  1304. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.FailToCreateShareMemory=1;
  1305. }
  1306. sleep(5);
  1307. system("reboot -f");
  1308. sleep(5);
  1309. system("reboot -f");
  1310. }
  1311. else
  1312. {
  1313. DEBUG_INFO("CreatShareMemory OK\r\n");
  1314. }
  1315. for(int gun_index = 0;gun_index<AC_QUANTITY;gun_index++)
  1316. {
  1317. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus = 0xff;
  1318. }
  1319. // Main loop
  1320. for(;;)
  1321. {
  1322. //==========================================
  1323. // Synchronize share memory from OCPP struct
  1324. //==========================================
  1325. ShmSysConfigAndInfo->SysInfo.OcppConnStatus = ShmOCPP16Data->OcppConnStatus;
  1326. //==========================================
  1327. // Something need run in Idle mode
  1328. //==========================================
  1329. if((ShmSysConfigAndInfo->SysInfo.AcChargingData[0].SystemStatus==SYS_MODE_IDLE) &&
  1330. (AC_QUANTITY>1?(ShmSysConfigAndInfo->SysInfo.AcChargingData[1].SystemStatus==SYS_MODE_IDLE):true))
  1331. {
  1332. //======================================
  1333. // Check restore factory setting request
  1334. //======================================
  1335. if(ShmSysConfigAndInfo->SysInfo.FactoryConfiguration)
  1336. {
  1337. system("cd /root;./Module_FactoryConfig -m");
  1338. system("sync");
  1339. sleep(5);
  1340. system("reboot -f");
  1341. sleep(5);
  1342. system("reboot -f");
  1343. }
  1344. //======================================
  1345. // Check upgrade firmware request
  1346. //======================================
  1347. if(ShmSysConfigAndInfo->SysInfo.FirmwareUpdate ||
  1348. ShmOCPP16Data->MsMsg.bits.UpdateFirmwareReq)
  1349. {
  1350. ShmCharger->isUpdateSuccess = FAIL;
  1351. for(int gun_index = 0;gun_index<AC_QUANTITY;gun_index++)
  1352. setChargerMode(gun_index, SYS_MODE_MAINTAIN);
  1353. }
  1354. }
  1355. //==========================================
  1356. // Check remote reset request
  1357. //==========================================
  1358. if(ShmOCPP16Data->MsMsg.bits.ResetReq)
  1359. {
  1360. if((!isMode(0, SYS_MODE_CHARGING) && !isMode(0, SYS_MODE_TERMINATING)) &&
  1361. (AC_QUANTITY>1?(!isMode(1, SYS_MODE_CHARGING) && !isMode(1, SYS_MODE_TERMINATING)):true))
  1362. {
  1363. ShmOCPP16Data->MsMsg.bits.ResetReq = OFF;
  1364. if(strcmp((char*)ShmOCPP16Data->Reset.Type, "Hard") == 0)
  1365. {
  1366. system("sync");
  1367. sleep(5);
  1368. system("reboot -f");
  1369. sleep(5);
  1370. system("reboot -f");
  1371. }
  1372. else
  1373. {
  1374. system("/usr/bin/run_evse_restart.sh");
  1375. }
  1376. }
  1377. }
  1378. //==========================================
  1379. // Check RFID
  1380. //==========================================
  1381. if(!ShmCharger->gun_info[ShmCharger->gun_selectd].rfidReq)
  1382. {
  1383. if(GetCardSerialNumber()!= FAIL)
  1384. {
  1385. ShmCharger->gun_info[ShmCharger->gun_selectd].rfidReq = ON;
  1386. }
  1387. }
  1388. //==========================================
  1389. // Connector loop
  1390. //==========================================
  1391. for(int gun_index = 0;gun_index<AC_QUANTITY;gun_index++)
  1392. {
  1393. // Assign connector location index for OCPP
  1394. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].Index = gun_index;
  1395. // Alarm event check
  1396. if((ShmCharger->gun_info[gun_index].primaryMcuAlarm.InputAlarmCode>0))
  1397. {
  1398. if(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus != SYS_MODE_ALARM)
  1399. {
  1400. setChargerMode(gun_index, SYS_MODE_ALARM);
  1401. }
  1402. }
  1403. else
  1404. {
  1405. if(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus == SYS_MODE_ALARM)
  1406. {
  1407. }
  1408. else if(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus == 0XFF)
  1409. {
  1410. setChargerMode(gun_index, SYS_MODE_BOOTING);
  1411. }
  1412. }
  1413. // Reservation request check
  1414. if(ShmOCPP16Data->CsMsg.bits[gun_index].ReserveNowReq)
  1415. {
  1416. ShmOCPP16Data->CsMsg.bits[gun_index].ReserveNowReq = OFF;
  1417. if(isMode(gun_index, SYS_MODE_IDLE) && !isReservationExpired(gun_index))
  1418. {
  1419. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].ReservationId = ShmOCPP16Data->ReserveNow[gun_index].ReservationId;
  1420. setChargerMode(gun_index, SYS_MODE_RESERVATION);
  1421. }
  1422. DEBUG_INFO("Reservation request on connector-%d.\r\n", gun_index);
  1423. ShmOCPP16Data->CsMsg.bits[gun_index].ReserveNowConf = ON;
  1424. }
  1425. // Change availability check
  1426. if(ShmOCPP16Data->CsMsg.bits[gun_index].ChangeAvailabilityReq)
  1427. {
  1428. if(strcmp((char*)ShmOCPP16Data->ChangeAvailability[gun_index].Type, "Operative") == 0)
  1429. {
  1430. if(isMode(gun_index, SYS_MODE_MAINTAIN))
  1431. {
  1432. setChargerMode(gun_index, SYS_MODE_IDLE);
  1433. ShmOCPP16Data->CsMsg.bits[gun_index].ChangeAvailabilityReq = OFF;
  1434. }
  1435. }
  1436. else
  1437. {
  1438. if(isMode(gun_index, SYS_MODE_IDLE))
  1439. {
  1440. setChargerMode(gun_index, SYS_MODE_MAINTAIN);
  1441. ShmOCPP16Data->CsMsg.bits[gun_index].ChangeAvailabilityReq = OFF;
  1442. }
  1443. }
  1444. }
  1445. // Connector process
  1446. switch(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].SystemStatus)
  1447. {
  1448. case SYS_MODE_BOOTING:
  1449. if(isModeChange(gun_index))
  1450. {
  1451. setLedMotion(gun_index,LED_ACTION_INIT);
  1452. //CSU Initialization & task spawn
  1453. if((Initialization() != PASS) ||
  1454. (SpawnTask() != PASS) )
  1455. {
  1456. ShmStatusCodeData->AlarmCode.AlarmEvents.bits.CsuInitFailed = ON;
  1457. }
  1458. }
  1459. if(ShmCharger->gun_info[gun_index].mcuFlag.isReadFwVerPass &&
  1460. ShmCharger->gun_info[gun_index].mcuFlag.isSetModelNamePass &&
  1461. ShmCharger->gun_info[gun_index].mcuFlag.isSetSerialNumberPass)
  1462. {
  1463. ShmCharger->gun_selectd = 0;
  1464. // Firmware version
  1465. get_firmware_version(gun_index);
  1466. // OCPP BootNotification info set
  1467. memcpy((char*)ShmOCPP16Data->OcppServerURL, (char*)ShmSysConfigAndInfo->SysConfig.OcppServerURL, ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.OcppServerURL));
  1468. memcpy((char*)ShmOCPP16Data->ChargeBoxId, (char*)ShmSysConfigAndInfo->SysConfig.ChargeBoxId, ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.ChargeBoxId));
  1469. sprintf((char*)ShmSysConfigAndInfo->SysConfig.chargePointVendor, "Phihong Technology");
  1470. sprintf((char*)ShmOCPP16Data->BootNotification.CpFwVersion, (char*)ShmSysConfigAndInfo->SysInfo.CsuRootFsFwRev);
  1471. sprintf((char*)ShmOCPP16Data->BootNotification.CpMeterSerialNumber, "N/A");
  1472. sprintf((char*)ShmOCPP16Data->BootNotification.CpMeterType, "AC");
  1473. DEBUG_INFO("Wifi mode: %d\r\n", ShmSysConfigAndInfo->SysConfig.AthInterface.WifiMode);
  1474. DEBUG_INFO("Wifi SSID: %s\r\n", ShmSysConfigAndInfo->SysConfig.AthInterface.WifiSsid);
  1475. DEBUG_INFO("Wifi password: %s\r\n", ShmSysConfigAndInfo->SysConfig.AthInterface.WifiPassword);
  1476. setChargerMode(gun_index, SYS_MODE_IDLE);
  1477. }
  1478. break;
  1479. case SYS_MODE_IDLE:
  1480. if(isModeChange(gun_index))
  1481. {
  1482. setLedMotion(gun_index,LED_ACTION_IDLE);
  1483. setRelay(gun_index,OFF);
  1484. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1485. ShmCharger->gun_info[gun_index].bleConfigData.isRequestStart = OFF;
  1486. ShmCharger->gun_info[gun_index].bleConfigData.isRequestStop = OFF;
  1487. ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStartTransactionReq = OFF;
  1488. ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStopTransactionReq = OFF;
  1489. ShmCharger->gun_info[gun_index].systemAlarmCode.SystemAlarmCode = 0x00;
  1490. ShmSysConfigAndInfo->SysConfig.MaxChargingCurrent = ShmCharger->gun_info[gun_index].primaryMcuState.rating_current;
  1491. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedDuration = 0;
  1492. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedEnergy = 0;
  1493. }
  1494. if(((ShmSysConfigAndInfo->SysConfig.AuthorisationMode == AUTH_MODE_FREE) && (ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PilotState == CP_STATE_B)) ||
  1495. (ShmCharger->gun_info[gun_index].rfidReq == ON) ||
  1496. (ShmCharger->gun_info[gun_index].bleConfigData.isRequestStart == ON) ||
  1497. (ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStartTransactionReq == ON))
  1498. {
  1499. // Clean User id & Card Number
  1500. memset(ShmSysConfigAndInfo->SysConfig.UserId, 0x00, ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.UserId));
  1501. memset(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].CardNumber, 0x00, ARRAY_SIZE(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].CardNumber));
  1502. if((ShmCharger->gun_info[gun_index].rfidReq == ON))
  1503. {
  1504. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod = START_METHOD_RFID;
  1505. DEBUG_INFO("Start Method : RFID...\r\n");
  1506. if(ShmSysConfigAndInfo->SysConfig.RfidCardNumEndian)
  1507. {
  1508. // Big endian
  1509. switch(rfid.snType)
  1510. {
  1511. case RFID_SN_TYPE_6BYTE:
  1512. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5]);
  1513. break;
  1514. case RFID_SN_TYPE_7BYTE:
  1515. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5], rfid.currentCard[6]);
  1516. break;
  1517. case RFID_SN_TYPE_10BYTE:
  1518. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5], rfid.currentCard[6], rfid.currentCard[7], rfid.currentCard[8], rfid.currentCard[9]);
  1519. break;
  1520. case RFID_SN_TYPE_4BYTE:
  1521. default:
  1522. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3]);
  1523. break;
  1524. }
  1525. }
  1526. else
  1527. {
  1528. // Little endian
  1529. switch(rfid.snType)
  1530. {
  1531. case RFID_SN_TYPE_6BYTE:
  1532. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X", rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1533. break;
  1534. case RFID_SN_TYPE_7BYTE:
  1535. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[6], rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1536. break;
  1537. case RFID_SN_TYPE_10BYTE:
  1538. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[9], rfid.currentCard[8], rfid.currentCard[7], rfid.currentCard[6], rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1539. break;
  1540. case RFID_SN_TYPE_4BYTE:
  1541. default:
  1542. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X", rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1543. break;
  1544. }
  1545. }
  1546. memcpy((char*)ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].CardNumber, ShmSysConfigAndInfo->SysConfig.UserId, ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.UserId));
  1547. DEBUG_INFO("Start request User Id : %s\r\n", ShmSysConfigAndInfo->SysConfig.UserId);
  1548. DEBUG_INFO("Card number : %s\r\n", ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].CardNumber);
  1549. }
  1550. else if(ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStartTransactionReq)
  1551. {
  1552. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod = START_METHOD_BACKEND;
  1553. memcpy(ShmSysConfigAndInfo->SysConfig.UserId, ShmOCPP16Data->RemoteStartTransaction[gun_index].IdTag, ARRAY_SIZE(ShmOCPP16Data->RemoteStartTransaction[gun_index].IdTag));
  1554. DEBUG_INFO("Start Method : BACKEND...\r\n");
  1555. }
  1556. else if(ShmCharger->gun_info[gun_index].bleConfigData.isRequestStart == ON)
  1557. {
  1558. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod = START_METHOD_BLE;
  1559. memcpy(ShmSysConfigAndInfo->SysConfig.UserId, ShmCharger->gun_info[gun_index].bleLoginCentralId.id, ARRAY_SIZE(ShmCharger->gun_info[gun_index].bleLoginCentralId.id));
  1560. DEBUG_INFO("Start Method : BLE...\r\n");
  1561. }
  1562. else
  1563. {
  1564. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod = START_METHOD_FREE;
  1565. DEBUG_INFO("Start Method : FREE..\r\n");
  1566. }
  1567. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1568. ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStartTransactionReq = OFF;
  1569. ShmCharger->gun_info[gun_index].bleConfigData.isRequestStart = OFF;
  1570. setChargerMode(gun_index, SYS_MODE_AUTHORIZING);
  1571. }
  1572. else
  1573. {}
  1574. break;
  1575. case SYS_MODE_AUTHORIZING:
  1576. if(isModeChange(gun_index))
  1577. {
  1578. setLedMotion(gun_index,LED_ACTION_AUTHED);
  1579. ftime(&startTime[gun_index][TMR_IDX_AUTH]);
  1580. if(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod == START_METHOD_RFID)
  1581. {
  1582. switch(ShmSysConfigAndInfo->SysConfig.AuthorisationMode)
  1583. {
  1584. case AUTH_MODE_BACKEND_OCPP:
  1585. if(ShmOCPP16Data->OcppConnStatus)
  1586. {
  1587. // On line
  1588. ShmOCPP16Data->SpMsg.bits.AuthorizeReq = ON;
  1589. }
  1590. else
  1591. {
  1592. // Off line
  1593. switch(ShmSysConfigAndInfo->SysConfig.OfflinePolicy)
  1594. {
  1595. case OFF_POLICY_LOCALLIST:
  1596. ShmOCPP16Data->SpMsg.bits.AuthorizeReq = ON;
  1597. break;
  1598. case OFF_POLICY_PH_RFID:
  1599. break;
  1600. case OFF_POLICY_FREE:
  1601. break;
  1602. case OFF_POLICY_NOCHARGE:
  1603. default:
  1604. break;
  1605. }
  1606. }
  1607. break;
  1608. case AUTH_MODE_FREE:
  1609. default:
  1610. break;
  1611. }
  1612. }
  1613. }
  1614. if(DiffTimebWithNow(startTime[gun_index][TMR_IDX_AUTH]) > TIMEOUT_SPEC_AUTH)
  1615. {
  1616. // Authorization timeout process.
  1617. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1618. setChargerMode(gun_index, SYS_MODE_IDLE);
  1619. DEBUG_WARN("Authorize timeout!\r\n");
  1620. }
  1621. else
  1622. {
  1623. switch(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod)
  1624. {
  1625. case START_METHOD_RFID:
  1626. if(ShmOCPP16Data->SpMsg.bits.AuthorizeConf ||
  1627. (ShmSysConfigAndInfo->SysConfig.AuthorisationMode == AUTH_MODE_FREE) ||
  1628. !ShmOCPP16Data->OcppConnStatus ||
  1629. ((isValidLocalWhiteCard() == PASS) && (ShmSysConfigAndInfo->SysConfig.OfflinePolicy == OFF_POLICY_LOCALLIST)))
  1630. {
  1631. if((strcmp((char*)ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, "Accepted")==0) ||
  1632. (ShmSysConfigAndInfo->SysConfig.AuthorisationMode == AUTH_MODE_FREE) ||
  1633. (!ShmOCPP16Data->OcppConnStatus&&(ShmSysConfigAndInfo->SysConfig.OfflinePolicy == OFF_POLICY_FREE)) ||
  1634. ((isValidLocalWhiteCard() == PASS) && (ShmSysConfigAndInfo->SysConfig.OfflinePolicy == OFF_POLICY_LOCALLIST)))
  1635. {
  1636. DEBUG_INFO("Authorize pass.\r\n");
  1637. setSpeaker(ON,SPEAKER_SHORT);
  1638. setChargerMode(gun_index, SYS_MODE_PREPARING);
  1639. }
  1640. else
  1641. {
  1642. DEBUG_INFO("Authorize fail.\r\n");
  1643. setSpeaker(ON,SPEAKER_INTERVAL_3COUNT);
  1644. setChargerMode(gun_index, SYS_MODE_IDLE);
  1645. }
  1646. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1647. ShmOCPP16Data->SpMsg.bits.AuthorizeConf = OFF;
  1648. }
  1649. break;
  1650. case START_METHOD_BACKEND:
  1651. case START_METHOD_BLE:
  1652. case START_METHOD_FREE:
  1653. default:
  1654. setSpeaker(ON,SPEAKER_SHORT);
  1655. setChargerMode(gun_index, SYS_MODE_PREPARING);
  1656. break;
  1657. }
  1658. }
  1659. break;
  1660. case SYS_MODE_PREPARING:
  1661. if(isModeChange(gun_index))
  1662. {
  1663. ftime(&startTime[gun_index][TMR_IDX_HANDSHAKING]);
  1664. setRelay(gun_index, ON);
  1665. }
  1666. if(DiffTimebWithNow(startTime[gun_index][TMR_IDX_HANDSHAKING]) > TIMEOUT_SPEC_HANDSHAKING)
  1667. {
  1668. setLedMotion(gun_index, LED_ACTION_HANDSHAKE_FAIL);
  1669. if(DiffTimebWithNow(startTime[gun_index][TMR_IDX_HANDSHAKING]) > TIMEOUT_SPEC_HANDSHAKING_LED)
  1670. {
  1671. DEBUG_INFO("HANDSHAKINNG TIMEOUT...");
  1672. setChargerMode(gun_index, SYS_MODE_IDLE);
  1673. }
  1674. }
  1675. else if((ShmCharger->gun_info[gun_index].primaryMcuState.relay_state == ON))
  1676. {
  1677. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].OutputEnergy = 0;
  1678. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedEnergy = 0;
  1679. getDateTimeString((char*)ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartDateTime);
  1680. ShmOCPP16Data->StartTransaction[gun_index].MeterStart = ShmCharger->gun_info[gun_index].powerConsumption.power_consumption;
  1681. memcpy((char*)ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartUserId, ShmSysConfigAndInfo->SysConfig.UserId, ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.UserId));
  1682. memcpy((char*)ShmOCPP16Data->StartTransaction[gun_index].IdTag, (char*)ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartUserId, ARRAY_SIZE(ShmOCPP16Data->StartTransaction[gun_index].IdTag));
  1683. ShmOCPP16Data->CpMsg.bits[gun_index].StartTransactionReq = ON;
  1684. setChargerMode(gun_index, SYS_MODE_CHARGING);
  1685. }
  1686. else if((ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PilotState == CP_STATE_B))
  1687. {
  1688. setLedMotion(gun_index,LED_ACTION_CONNECTED);
  1689. }
  1690. break;
  1691. case SYS_MODE_CHARGING:
  1692. if(isModeChange(gun_index))
  1693. {
  1694. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1695. ftime(&startChargingTime[gun_index]);
  1696. }
  1697. if((ShmCharger->gun_info[gun_index].rfidReq == ON) ||
  1698. (ShmCharger->gun_info[gun_index].bleConfigData.isRequestStop == ON) ||
  1699. (ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStopTransactionReq == ON)||
  1700. (ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PilotState != CP_STATE_C) ||
  1701. ShmOCPP16Data->MsMsg.bits.ResetReq)
  1702. {
  1703. // If RFID SN different with start user, it need to authorize ID
  1704. if((ShmCharger->gun_info[gun_index].rfidReq == ON) && !isMatchStartUser(gun_index))
  1705. {
  1706. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1707. if(DiffTimebWithNow(startTime[gun_index][TMR_IDX_AUTH]) > TIMEOUT_SPEC_AUTH)
  1708. {
  1709. // Request authorization
  1710. ftime(&startTime[gun_index][TMR_IDX_AUTH]);
  1711. memset(ShmSysConfigAndInfo->SysConfig.UserId, 0x00, ARRAY_SIZE(ShmSysConfigAndInfo->SysConfig.UserId));
  1712. if(ShmSysConfigAndInfo->SysConfig.RfidCardNumEndian)
  1713. {
  1714. // Big endian
  1715. switch(rfid.snType)
  1716. {
  1717. case RFID_SN_TYPE_6BYTE:
  1718. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5]);
  1719. break;
  1720. case RFID_SN_TYPE_7BYTE:
  1721. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5], rfid.currentCard[6]);
  1722. break;
  1723. case RFID_SN_TYPE_10BYTE:
  1724. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3], rfid.currentCard[4], rfid.currentCard[5], rfid.currentCard[6], rfid.currentCard[7], rfid.currentCard[8], rfid.currentCard[9]);
  1725. break;
  1726. case RFID_SN_TYPE_4BYTE:
  1727. default:
  1728. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X", rfid.currentCard[0], rfid.currentCard[1], rfid.currentCard[2], rfid.currentCard[3]);
  1729. break;
  1730. }
  1731. }
  1732. else
  1733. {
  1734. // Little endian
  1735. switch(rfid.snType)
  1736. {
  1737. case RFID_SN_TYPE_6BYTE:
  1738. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X", rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1739. break;
  1740. case RFID_SN_TYPE_7BYTE:
  1741. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[6], rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1742. break;
  1743. case RFID_SN_TYPE_10BYTE:
  1744. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X", rfid.currentCard[9], rfid.currentCard[8], rfid.currentCard[7], rfid.currentCard[6], rfid.currentCard[5], rfid.currentCard[4], rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1745. break;
  1746. case RFID_SN_TYPE_4BYTE:
  1747. default:
  1748. sprintf((char*)ShmSysConfigAndInfo->SysConfig.UserId, "%02X%02X%02X%02X", rfid.currentCard[3], rfid.currentCard[2], rfid.currentCard[1], rfid.currentCard[0]);
  1749. break;
  1750. }
  1751. }
  1752. DEBUG_INFO("End request User Id : %s\r\n", ShmSysConfigAndInfo->SysConfig.UserId);
  1753. if(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartMethod == START_METHOD_RFID)
  1754. {
  1755. switch(ShmSysConfigAndInfo->SysConfig.AuthorisationMode)
  1756. {
  1757. case AUTH_MODE_BACKEND_OCPP:
  1758. if(ShmOCPP16Data->OcppConnStatus)
  1759. {
  1760. // On line
  1761. ShmOCPP16Data->SpMsg.bits.AuthorizeReq = ON;
  1762. }
  1763. else
  1764. {
  1765. // Off line
  1766. switch(ShmSysConfigAndInfo->SysConfig.OfflinePolicy)
  1767. {
  1768. case OFF_POLICY_LOCALLIST:
  1769. ShmOCPP16Data->SpMsg.bits.AuthorizeReq = ON;
  1770. break;
  1771. case OFF_POLICY_PH_RFID:
  1772. break;
  1773. case OFF_POLICY_FREE:
  1774. break;
  1775. case OFF_POLICY_NOCHARGE:
  1776. default:
  1777. break;
  1778. }
  1779. }
  1780. break;
  1781. case AUTH_MODE_FREE:
  1782. default:
  1783. break;
  1784. }
  1785. }
  1786. }
  1787. else
  1788. {
  1789. if(ShmOCPP16Data->SpMsg.bits.AuthorizeConf ||
  1790. (ShmSysConfigAndInfo->SysConfig.AuthorisationMode == AUTH_MODE_FREE) ||
  1791. !ShmOCPP16Data->OcppConnStatus)
  1792. {
  1793. if((strcmp((char*)ShmOCPP16Data->Authorize.ResponseIdTagInfo.Status, "Accepted")==0) ||
  1794. (ShmSysConfigAndInfo->SysConfig.AuthorisationMode == AUTH_MODE_FREE) ||
  1795. (!ShmOCPP16Data->OcppConnStatus&&(ShmSysConfigAndInfo->SysConfig.OfflinePolicy == OFF_POLICY_FREE)))
  1796. {
  1797. ShmCharger->gun_info[gun_index].isAuthPassEnd = ON;
  1798. setChargerMode(gun_index, SYS_MODE_TERMINATING);
  1799. }
  1800. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1801. ShmOCPP16Data->SpMsg.bits.AuthorizeConf = OFF;
  1802. }
  1803. }
  1804. }
  1805. else
  1806. {
  1807. setChargerMode(gun_index, SYS_MODE_TERMINATING);
  1808. }
  1809. }
  1810. else
  1811. {
  1812. /*
  1813. * TODO:
  1814. * 1. Update charging cycle information.
  1815. * 2. CP PWM duty dynamic control logic.
  1816. */
  1817. setRelay(gun_index,ON);
  1818. setLedMotion(gun_index,LED_ACTION_CHARGING);
  1819. ShmOCPP16Data->StopTransaction[gun_index].MeterStop = ((float)ShmCharger->gun_info[gun_index].powerConsumption.power_consumption/100.0) - ShmOCPP16Data->StartTransaction[gun_index].MeterStart;
  1820. ftime(&endChargingTime[gun_index]);
  1821. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedDuration = DiffTimeb(startChargingTime[gun_index], endChargingTime[gun_index]);
  1822. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedEnergy = (ShmCharger->gun_info[gun_index].powerConsumption.power_consumption - ShmOCPP16Data->StartTransaction[gun_index].MeterStart)/100.0;
  1823. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].OutputEnergy = (ShmCharger->gun_info[gun_index].powerConsumption.power_consumption - ShmOCPP16Data->StartTransaction[gun_index].MeterStart)/100.0;
  1824. // Charging profile
  1825. }
  1826. break;
  1827. case SYS_MODE_TERMINATING:
  1828. if(isModeChange(gun_index))
  1829. {
  1830. setLedMotion(gun_index,LED_ACTION_STOP);
  1831. if(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedDuration != 0)
  1832. {
  1833. ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PresentChargedDuration = DiffTimeb(startChargingTime[gun_index], endChargingTime[gun_index]);
  1834. }
  1835. }
  1836. if(((ShmCharger->gun_info[gun_index].rfidReq == ON) && isMatchStartUser(gun_index)) ||
  1837. (ShmCharger->gun_info[gun_index].isAuthPassEnd) ||
  1838. (ShmCharger->gun_info[gun_index].bleConfigData.isRequestStop == ON) ||
  1839. (ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStopTransactionReq == ON) ||
  1840. (ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PilotState == CP_STATE_A) ||
  1841. ShmOCPP16Data->MsMsg.bits.ResetReq)
  1842. {
  1843. /*
  1844. * TODO:
  1845. * 1. Record charging history.
  1846. */
  1847. if(ShmCharger->gun_info[gun_index].legacyRequest.isLegacyRequest == ON)
  1848. {
  1849. setSpeaker(ON,SPEAKER_SHORT);
  1850. if(ShmOCPP16Data->MsMsg.bits.ResetReq)
  1851. {
  1852. if(strcmp((char*)ShmOCPP16Data->Reset.Type, "Hard")==0)
  1853. sprintf((char*)ShmOCPP16Data->StopTransaction[gun_index].StopReason, "HardReset");
  1854. else
  1855. sprintf((char*)ShmOCPP16Data->StopTransaction[gun_index].StopReason, "SoftReset");
  1856. }
  1857. else if(ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStopTransactionReq)
  1858. {
  1859. sprintf((char*)ShmOCPP16Data->StopTransaction[gun_index].StopReason, "Remote");
  1860. }
  1861. else if(ShmCharger->gun_info[gun_index].rfidReq || ShmCharger->gun_info[gun_index].bleConfigData.isRequestStop)
  1862. {
  1863. sprintf((char*)ShmOCPP16Data->StopTransaction[gun_index].StopReason, "Local");
  1864. }
  1865. else if(ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PilotState == CP_STATE_A)
  1866. {
  1867. sprintf((char*)ShmOCPP16Data->StopTransaction[gun_index].StopReason, "EVDisconnected");
  1868. }
  1869. else
  1870. {
  1871. sprintf((char*)ShmOCPP16Data->StopTransaction[gun_index].StopReason, "Other");
  1872. }
  1873. memcpy((char*)ShmOCPP16Data->StopTransaction[gun_index].IdTag, (char*)ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StartUserId, ARRAY_SIZE(ShmOCPP16Data->StopTransaction[gun_index].IdTag));
  1874. ShmOCPP16Data->StopTransaction[gun_index].MeterStop = ShmCharger->gun_info[gun_index].powerConsumption.power_consumption;
  1875. ShmOCPP16Data->CpMsg.bits[gun_index].StopTransactionReq = ON;
  1876. getDateTimeString((char*)ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].StopDateTime);
  1877. }
  1878. setRelay(gun_index,OFF);
  1879. if(!ShmCharger->gun_info[gun_index].primaryMcuState.relay_state)
  1880. {
  1881. ShmCharger->gun_info[gun_index].rfidReq = OFF;
  1882. ShmCharger->gun_info[gun_index].isAuthPassEnd = OFF;
  1883. ShmCharger->gun_info[gun_index].bleConfigData.isRequestStop = OFF;
  1884. ShmOCPP16Data->CsMsg.bits[gun_index].RemoteStopTransactionReq = OFF;
  1885. DB_Insert_Record(localDb, gun_index);
  1886. setChargerMode(gun_index, SYS_MODE_IDLE);
  1887. }
  1888. }
  1889. else
  1890. {
  1891. if((ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PilotState == CP_STATE_C))
  1892. {
  1893. setChargerMode(gun_index, SYS_MODE_CHARGING);
  1894. }
  1895. }
  1896. setLedMotion(gun_index,LED_ACTION_STOP);
  1897. break;
  1898. case SYS_MODE_ALARM:
  1899. if((ShmCharger->gun_info[gun_index].systemAlarmCode.SystemAlarmCode == 0))
  1900. {
  1901. if((ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus == SYS_MODE_CHARGING) ||
  1902. (ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus == SYS_MODE_TERMINATING))
  1903. {
  1904. setChargerMode(gun_index, ShmSysConfigAndInfo->SysInfo.AcChargingData[gun_index].PreviousSystemStatus);
  1905. }
  1906. else
  1907. {
  1908. setChargerMode(gun_index, SYS_MODE_IDLE);
  1909. }
  1910. }
  1911. setLedMotion(gun_index,LED_ACTION_ALARM);
  1912. break;
  1913. case SYS_MODE_FAULT:
  1914. if(isModeChange(gun_index))
  1915. {
  1916. /*
  1917. * TODO:
  1918. * 1. LED control depend on relay status
  1919. * 2. Alarm latch & release logic
  1920. */
  1921. }
  1922. break;
  1923. case SYS_MODE_MAINTAIN:
  1924. if(isModeChange(gun_index))
  1925. {
  1926. /*
  1927. * TODO:
  1928. * 1. LED control depend on relay status
  1929. * 2. Wait maintenance release command
  1930. */
  1931. setLedMotion(gun_index,LED_ACTION_MAINTAIN);
  1932. }
  1933. //======================================
  1934. // Check local upgrade firmware request
  1935. //======================================
  1936. if(ShmSysConfigAndInfo->SysInfo.FirmwareUpdate)
  1937. {
  1938. DEBUG_INFO("Firmware local upgrading...\r\n");
  1939. ShmSysConfigAndInfo->SysInfo.FirmwareUpdate = OFF;
  1940. if(upgrade_check())
  1941. {
  1942. ShmCharger->isUpdateSuccess = PASS;
  1943. }
  1944. else
  1945. {
  1946. ShmCharger->isUpdateSuccess = FAIL;
  1947. }
  1948. }
  1949. else if(ShmOCPP16Data->MsMsg.bits.UpdateFirmwareReq)
  1950. {
  1951. //======================================
  1952. // Check remote upgrade firmware request
  1953. //======================================
  1954. if(strcmp((char*)ShmOCPP16Data->FirmwareStatusNotification.Status, "DownloadFailed")==0)
  1955. {
  1956. DEBUG_INFO("Firmware remote upgraded fail...\r\n");
  1957. ShmOCPP16Data->MsMsg.bits.UpdateFirmwareReq = OFF;
  1958. ShmCharger->isUpdateSuccess = FAIL;
  1959. }
  1960. else if(strcmp((char*)ShmOCPP16Data->FirmwareStatusNotification.Status, "Downloaded")==0)
  1961. {
  1962. DEBUG_INFO("Firmware remote upgrading...\r\n");
  1963. sprintf((char*)ShmOCPP16Data->FirmwareStatusNotification.Status, "Installing");
  1964. ShmOCPP16Data->SpMsg.bits.FirmwareStatusNotificationReq = ON;
  1965. ShmOCPP16Data->MsMsg.bits.UpdateFirmwareReq = OFF;
  1966. if(upgrade_check())
  1967. {
  1968. ShmCharger->isUpdateSuccess = PASS;
  1969. }
  1970. else
  1971. {
  1972. ShmCharger->isUpdateSuccess = FAIL;
  1973. }
  1974. }
  1975. else
  1976. {}
  1977. }
  1978. else
  1979. {
  1980. //======================================
  1981. // Upgrade complete reboot system
  1982. //======================================
  1983. if(!ShmCharger->gun_info[gun_index].mcuFlag.isMcuUpgradeReq && ((AC_QUANTITY>1)?!ShmCharger->gun_info[gun_index^1].mcuFlag.isMcuUpgradeReq:YES))
  1984. {
  1985. if(ShmCharger->isUpdateSuccess == PASS)
  1986. {
  1987. sprintf((char*)ShmOCPP16Data->FirmwareStatusNotification.Status, "Installed");
  1988. ShmOCPP16Data->SpMsg.bits.FirmwareStatusNotificationReq = ON;
  1989. DEBUG_WARN("Firmware upgrade success.\r\n");
  1990. sleep(5);
  1991. DEBUG_INFO("Firmware upgraded, reboot...\r\n");
  1992. system("reboot -f");
  1993. sleep(5);
  1994. system("reboot -f");
  1995. }
  1996. else
  1997. {
  1998. sprintf((char*)ShmOCPP16Data->FirmwareStatusNotification.Status, "InstallationFailed");
  1999. ShmOCPP16Data->SpMsg.bits.FirmwareStatusNotificationReq = ON;
  2000. DEBUG_WARN("Firmware upgrade fail.\r\n");
  2001. system("/usr/bin/run_evse_restart.sh");
  2002. }
  2003. }
  2004. }
  2005. break;
  2006. case SYS_MODE_RESERVATION:
  2007. if(isModeChange(gun_index))
  2008. {
  2009. setLedMotion(gun_index,LED_ACTION_MAINTAIN);
  2010. }
  2011. if(isReservationExpired(gun_index) || ShmOCPP16Data->CsMsg.bits[gun_index].CancelReservationReq)
  2012. {
  2013. setChargerMode(gun_index, SYS_MODE_IDLE);
  2014. ShmOCPP16Data->CsMsg.bits[gun_index].CancelReservationReq = OFF;
  2015. ShmOCPP16Data->CsMsg.bits[gun_index].CancelReservationConf = ON;
  2016. }
  2017. break;
  2018. case SYS_MODE_BOOKING:
  2019. if(isModeChange(gun_index))
  2020. {
  2021. /*
  2022. * TODO:
  2023. * 1. LED control depend on relay status
  2024. * 2. Check booking start is on time?
  2025. */
  2026. }
  2027. break;
  2028. case SYS_MODE_DEBUG:
  2029. if(isModeChange(gun_index))
  2030. {
  2031. /*
  2032. * TODO:
  2033. * 1. LED control depend on relay status
  2034. */
  2035. }
  2036. setLedMotion(gun_index,LED_ACTION_DEBUG);
  2037. break;
  2038. }
  2039. }
  2040. usleep(50000);
  2041. }
  2042. return FAIL;
  2043. }